port – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:46:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png port – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The French Disconnection | TechSNAP 211 https://original.jupiterbroadcasting.net/81082/the-french-disconnection-techsnap-211/ Fri, 24 Apr 2015 01:11:19 +0000 https://original.jupiterbroadcasting.net/?p=81082 What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all. Plus a great round up, fantastic questions, our answers & much, much more! […]

The post The French Disconnection | TechSNAP 211 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all.

Plus a great round up, fantastic questions, our answers & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Security analytics: The key for breach detection

  • “Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced attacks has reached boardroom-level attention, and this heightened attention to security has freed up funds for many organizations to better their odds against such attacks.”
  • “Breach detection is top of mind for security buyers and the field of security technologies claiming to find breaches or detect advanced attacks is at an all-time noise level,” said Eric Ahlm, research director at Gartner. “Security analytics platforms endeavor to bring situational awareness to security events by gathering and analyzing a broader set of data, such that the events that pose the greatest harm to an organization are found and prioritized with greater accuracy.”
  • The approach that seems to be in favour at the moment is: security information and event management (SIEM)
  • “While most SIEM products have the ability to collect, store and analyze security data, the meaning that can be pulled from a data store (such as the security data found in a SIEM) depends on how the data is reviewed. How well a SIEM product can perform automated analytics — compared with user queries and rules — has become an area of differentiation among SIEM providers.”
  • “User behavior analytics (UBA) is another example of security analytics that is already gaining buyer attention. UBA allows user activity to be analyzed, much in the same way a fraud detection system would monitor a user’s credit cards for theft. UBA systems are effective at detecting meaningful security events, such as a compromised user account and rogue insiders. Although many UBA systems can analyze more data than just user profiles, such as devices and geo-locations, there is still an opportunity to enhance the analytics to include even more data points that can increase the accuracy of detecting a breach.”
  • “As security analytics platforms grow in maturity and accuracy, a driving factor for their innovation is how much data can be brought into the analysis. Today, information about hosts, networks, users and external actors is the most common data brought into an analysis. However, the amount of context that can be brought into an analysis is truly boundless and presents an opportunity for owners of interesting data and the security providers looking to increase their effectiveness.”
  • “Analytics systems, on average, tend to do better analyzing lean, or metadata-like, data stores that allow them to quickly, in almost real-time speed, produce interesting findings. The challenge to this approach is that major security events, such as breaches, don’t happen all at once. There may be an early indicator, followed hours later by a minor event, which in turn is followed days or months later by a data leakage event. When these three things are looked at as a single incident that just happens to span, say, three months, the overall priority of this incident made up of lesser events is now much higher, which is why “look backs” are a key concept for analytics systems.”
  • “Ultimately, how actual human users interface with the outputs of large data analytics will greatly determine if the technology is adopted or deemed to produce useful information in a reasonable amount of time,” said Mr. Ahlm. “Like other disciplines that have leveraged large data analytics to discover new things or produce new outputs, visualization of that data will greatly affect adoption of the technology.”
  • It will be interesting to see where the industry goes with these new concepts

China’s Great Cannon

  • “This post describes our analysis of China’s “Great Cannon,” our term for an attack tool that we identify as separate from, but co-located with, the Great Firewall of China. The first known usage of the Great Cannon is in the recent large-scale novel DDoS attack on both GitHub and servers used by GreatFire.org.”
  • “On March 16, GreatFire.org observed that servers they had rented to make blocked websites accessible in China were being targeted by a Distributed Denial of Service (DDoS) attack. On March 26, two GitHub pages run by GreatFire.org also came under the same type of attack. Both attacks appear targeted at services designed to circumvent Chinese censorship. A report released by GreatFire.org fingered malicious Javascript returned by Baidu servers as the source of the attack. Baidu denied that their servers were compromised.”
  • “Several previous technical reports have suggested that the Great Firewall of China orchestrated these attacks by injecting malicious Javascript into Baidu connections. This post describes our analysis of the attack, which we were able to observe until April 8, 2015.”
  • “We show that, while the attack infrastructure is co-located with the Great Firewall, the attack was carried out by a separate offensive system, with different capabilities and design, that we term the “Great Cannon.” The Great Cannon is not simply an extension of the Great Firewall, but a distinct attack tool that hijacks traffic to (or presumably from) individual IP addresses, and can arbitrarily replace unencrypted content as a man-in-the-middle.”
  • The report is broken down into a number of sections
  • Section 2 locates and characterizes the Great Cannon as a separate system;
  • Section 3 analyzes DDoS logs and characterizes the distribution of affected systems;
  • Section 4 presents our attribution of the Great Cannon to the Government of China;
  • Section 5 addresses the policy context and implications;
  • Section 6 addresses the possibility of using the Great Cannon for targeted exploitation of individual users.
  • I wonder what the next target of the Great Cannon of China will be

New French Surveillance Law

  • “The new French Intelligence Bill has provoked concern among many of the country’s lawmakers, as well as international NGOs.”
  • “According to French Human Rights Defender Jacques Toubon, the legislation contravenes the rulings of the European Court of Human Rights”
  • “Despite boasting the support of France’s two major political parties, the Union for a Popular Movement (UMP) and the Socialist Party (PS), the Intelligence Bill has come in for some strong criticism in France, and it is now also beginning to raise eyebrows abroad.”
  • “Many international NGOs, have condemned the vague and general nature of the bill. Designed to legalise certain surveillance practices, the bill would also broaden the powers of the security services, giving them the authority to ask private operators to follow and report on the activity of internet users. The debate over using terrorism as an excuse for internet surveillance is already raging in France, since Paris decided to “block” access to certain sites in the wake of the 7 January attacks.”
  • “But the new bill goes even further. If adopted, it will allow investigators and government agents to intercept private emails and telephone conversations in the name of security, if they are directly linked to an investigation. Agents would be allowed to use new technologies wherever they deem necessary, including microphones, trackers and spy cameras. They would also be able to intercept conversations typed on a keyboard in real time. All these interceptions would be authorised by the Prime Minister, without the prior approval of a judge, and would be authorised after the fact by a new administrative authority, the National Commission for the Control of Intelligence Techniques (CNCTR).”
  • “Seven companies, including web hosting and technology companies OVH, IDS, and Gandi have said in a letter to the French prime minister Manuel Valls that they will be pushed into de facto “exile” if the French government goes ahead with the “real-time capture of data” by its intelligence agencies.”
  • Letter to French Prime Minister (in French)
  • This has caused a very large backlash from the IT community
  • Especially some of the large Internet and Server providers like Gandi, OVH, IDS, Ikoula and Lomaco who have threatened to leave France if the law passes
  • OVH and Gandi threaten to move their operations, customers, tax revenue, and most importantly, 1000s of high tech jobs
  • Hopefully this sends a clear warning to the US and other countries who are considering or proposing similar legislation, or who’s intelligence agencies have run amok
  • “The companies argued that being required by the law to install “black boxes” on their networks will “destroy a major segment of the economy,” and if passed it will force them to “move our infrastructure, investments, and employees where our customers will want to work with us.” Citing a figure of 30-40 percent of foreign users, the companies say their customers come to them “because there is no Patriot Act in France,” France’s surveillance bill (“projet de loi relatif au renseignement”) allows the government’s law enforcement and intelligence agencies to immediately access live phone and cellular data for anyone suspected of being linked to terrorism. These phone records can be held for five years.”
  • Tech firms threaten mass exodus from franch of new mass suveillance law
  • Additional Coverage
  • Hacker News

Feedback:

Some twitter comics:

Second Set:


Round Up:


The post The French Disconnection | TechSNAP 211 first appeared on Jupiter Broadcasting.

]]>
Fine Wine or Sour Ports | LINUX Unplugged 42 https://original.jupiterbroadcasting.net/58337/fine-wine-or-sour-ports-lup-42/ Tue, 27 May 2014 16:28:39 +0000 https://original.jupiterbroadcasting.net/?p=58337 Liam from Gaming on Linux joins us to discuss the Witcher 2 port fiasco, and why Linux’s reputation as a gaming platform could be on the line. Plus a heated Manjaro discussion, your feedback, and a BIG announcement! Thanks to: Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | […]

The post Fine Wine or Sour Ports | LINUX Unplugged 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Liam from Gaming on Linux joins us to discuss the Witcher 2 port fiasco, and why Linux’s reputation as a gaming platform could be on the line.

Plus a heated Manjaro discussion, your feedback, and a BIG announcement!

Thanks to:

\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Show Notes:

FU:

The Witcher 2 Drama:

Guest: Liam Dawe (upurtweet) on Twitter

Full time dad, owner of @gamingonlinux and writer for @linuxvoice !

eON is a middle ground idea between what WINE does, and a native port. It is tuned and customised to each game we port — we do not simply slap a Windows binary into it and ship the game. For example, we often customise the D3D9->GL code path in various ways to cater for the title. Shaders are often rewritten to native GLSL, etc.

_The problem is if we keep accepting ports at a sub-par quality then Linux will gain a reputation for having low quality games. Think about that big picture for a moment, seriously.

_

New Show: Tech Talk Today (Mon – Thur)

9am Pacific / 12pm Eastern / 7pm GMT

  • A daily, low key tech talk show. Covering the entire industry.

  • A rotating cast of friends will join me, sometimes I’ll be solo.

  • A unique perspective and insights, from outside the valley bubble. Outside the grasp of Google or Apple influence. A perspective from the open source community considering the important topics of the day.

  • The state of technology coverage has bothered me for a long time, and specifically as many LUP listeners know the coverage of the Linux and open source communities.

  • The show will try and be a daily taste maker of interesting topics and discussion.

  • The daily format will allow for a large range of topics, and active live participation via Mumble, etc for talk back.

  • Could be a little on the risky side, very blunt and honest opinions. Calling it like we see it.

  • Patreon funded, with some limited sponsor opportunities available.

  • Willing to consider discounted community spots.

  • The Patreon fund is basically a fund JB’s growth campaign, and you get a daily show as a thank you.

  • The revenue raised via Tech Talk Today’s Patreon funding will finance studio upgrades from facilities, to equipment, and even living conditions.

  • Long term plans include funding a road show, and other big things we could only pull off with a stable platform of funding for us to stand on.

  • This is a grand experiment. I’ve wanted to do a daily show again for a while, but its also some of the hardest workout there. It’s a lifestyle. Can I keep it up? Can we fund future JB growth? I’m not sure, but I am damn excited to find out!

The post Fine Wine or Sour Ports | LINUX Unplugged 42 first appeared on Jupiter Broadcasting.

]]>
Password SecuritIEEE | TechSNAP 77 https://original.jupiterbroadcasting.net/25166/password-securitieee-techsnap-77/ Thu, 27 Sep 2012 16:30:08 +0000 https://original.jupiterbroadcasting.net/?p=25166 Big password leak from a major industry player, mobile secuirty takes a big hit, we cover a couple of the major vulnerabilities affecting our favorite gadgets.

The post Password SecuritIEEE | TechSNAP 77 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A big password leak from a major industry player, mobile security takes a big hit, we cover a couple of the major vulnerabilities affecting our favorite gadgets, and more Java troubles.

Plus moving from Apache to Nginx, and a big batch of your questions.

All that and so much more, on this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

BONOUS ROUND PROMO:

Get your .COMs just $5.99 per year up to 3 domains! Additional .COMs just $7.99 per year!
CODE: 599tech

Expires 10/31/12

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox

Virgin Mobile USA customers may be at risk

  • Virgin Mobile customers in the USA access their customer portal using their mobile phone number and a 6 digit pin
  • In addition to the obvious lack of security of using such a limited keyspace, it seems that the Virgin portal does not implement any type of lockout or intrusion detection
  • Specifically, they do not block an IP after 100s of failed attempts, meaning an attacker can quickly run through the entire 1 million possible passwords and gain access to any account
  • Kevin Burke, the researcher who discovered the flaw, said that after several phone and email exchanges with parent company Sprint in which he attempted to warn them about the exploit, he was ignored and his concerns were dismissed
  • Later, a fix was applied to the portal, blocking users after 4 failed attempts, however it relied on a browser cookie to keep track of the number. In additional to how easily this mitigation is evaded, most attack scripts don’t keep cookies anyway
  • Virgin’s portal now correctly blocks an IP address after 20 failed attempts
  • Virgin uses a 404 error instead of 503 or another more proper error code
  • Additional Coverage

Security Explorations finds another Java 0-day, for Java SE 5, 6 and 7

  • Security Explorations, the Polish research firm that found the previous Java exploits, has now topped 50 different vulnerabilities reported to Oracle, and the 50th one is the worst to date
  • The flaw affects fully patched Windows 7 machine, using all major browsers
  • Oracle has produced a comprehensive status report regarding upcoming Java Critical Patch Update. The company claims to have fixes for all, except two issues (29 and 50) integrated and undergoing testing for release in the October 2012 Java SE CPU. Oracle is still evaluating fixes for Issue 50 and will provide further update on whether a fix for it will be also included in the October 2012 Java SE CPU
  • Additional Coverage

IEEE passwords exposed via FTP site

  • A researcher found a log file on a publically accessible IEEE FTP site
  • The file contained logs from 01/Aug/2012:20:46:28 +0000​ to 18/Sep/2012:08:47:17 +0000
  • The log contained around 375 million lines, 400,000 of which contained plain text passwords, 17k of which were password reset requests
  • A total of 99,979 unique usernames were found
  • 7 of the top 10 passwords were all numeric, variations of 123 – 1234567890
  • Other popular passwords included ieee2012, IEEE2012, password, library and ADMIN123
  • 38% of users use gmail, 7.6% use yahoo
  • It does not appear that the IEEE actually stores usernames and passwords in plaintext in its authentication database, but it is unclear why or how the passwords were included in the access logs
  • The IEEE acknowledged the breach
  • And issues a notice to its members, encouraging them to use strong passwords when they are forced to reset thier password
  • Additional Coverage

Your Android phone could be remotely erased by a malicious website

Feedback:

Book: Nginx HTTP Server

It provides a step-by-step tutorial to replace your existing web server with Nginx. With commented configuration sections and in-depth module descriptions

Have some fun:

What I wish the new hires “knew”

Round-Up:

HALL of SHAME: Secret Microsoft policy limited Hotmail passwords to 16 characters

The post Password SecuritIEEE | TechSNAP 77 first appeared on Jupiter Broadcasting.

]]> Self Healing Internet | TechSNAP 76 https://original.jupiterbroadcasting.net/24846/self-healing-internet-techsnap-76/ Thu, 20 Sep 2012 16:42:00 +0000 https://original.jupiterbroadcasting.net/?p=24846 The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

Plus: A huge batch of your feedback, and so much more in this week’s episode of TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Sophos anti-virus detects it self

  • Earlier this week Sophos released a scheduled update to their anti-virus definition files
  • The new definitions detected the Sophos updating process, and a number of other auto-updating applications, as variants of the malware Shh/Updater-B
  • In addition to setting of a huge volume of false positives, the detection also resulted in the quarantine, blocking or deletion of parts of the Sophos updater
  • The updated definitions that solve the problem were released on Wed, 19 Sep 2012 21:32 BST
  • However, the updated definitions could not be downloaded by Sophos, because the updater had been broken
  • This is an especially large issue for enterprise deployments of Sophos
  • The Sophos support number was down, the call volume was so great that most people could not even get into the hold queue

0-day Flaw in Internet Explorer active in the wild

  • Internet Explorer versions 6 through 9 are vulnerable to a new series of attacks
  • Exploits for a previously unknown use-after-free memory corruption vulnerability, in addition to three more exploits that were found and tied to a hacker group in China known as Nitro (the same group responsible for exploits of two zero-day Java flaws disclosed three weeks ago)
  • Security researcher Eric Romang discovered the first of the exploits last weekend while monitoring an infected server
  • When a user lands on an infected page, the exploit installs the PoisonIvy remote access Trojan
  • Jaime Blasco of AlienVault Labs then discovered three additional exploits, one of which drops the PlugX trojan
  • The new exploits appear to be targeted at defense contractors in the U.S. and India
  • An unknown exploit was found in a Defense News Portal site in India, it had been served for at least four days
  • Microsoft is slated to release a patch on Friday , until then, a ‘fixit’ patch is available
  • A new metasploit module to test for and exploit the vulnerability has been released
  • Additional Coverage

The “top secret” room where 260 Internet Service Providers connect

  • Nearly every carrier neutral data center in the world contains a MeetMe room
  • MeetMe rooms more often used for private peering, rather than internet transit
  • Transit is when you buy ‘Internet’ service from another provider, they provide you with a ‘default route’ that you can send traffic to, and it will be delivered to anywhere on the internet
  • Peering is where providers swap traffic that is specifically destin to each others networks, so if Provider A peers with Provider B, Provider A must use their transit connection to reach provider C, only traffic between A and B (and their customers) are allowed across the ‘peering’ link
  • If 1 Wilshire (the building in question) were to go entirely offline, all connections in and out severed, the Internet would continue to operate, traffic would be routed around the missing nodes
  • Performance would be degraded, and it is possible that some of the ‘backup’ routes could not handle all of the traffic, but the network would not cease to work
  • The Internet is based on the principle of being able to get data from Point A to any Point B, reliably
  • To do this, the Internet’s backbone providers use BGP4 routing protocol (Border Gateway Protocol)
  • Most Internet Transit providers have maps that look like this:
  • nLayer
  • Hurricane Electric
  • Abovenet (Zayo)
  • Level3
  • NTT
  • Vocus (Australian)
  • As you can see on most all of these maps, there are almost always multiple paths that a packet can take to get from point A to point B

Feedback:

Special Community Events

  • Lynx Music:

He goes by Illusionist Lynx and he’s used MATH to make music (and a bunch of ther cool methods) check out his pay-what-you-want music on his bandcamp site: Illusionist Lynx

  • Nicholas is getting married, and he needs your HELP!

Nicholas is live streaming his marriage proposal, and hopes to have the JB audience tune in, and maybe help get his girl friend to the right location!

The site people can visit is https://rachelwillyoumarryme.com/

  • Visit his site an hour before the event (countdown on his website)
  • When the call to action comes, help him spam his girlfriend into arriving at the correct location.
  • To help organize, show up early and watch the show’s subreddit!

Have some fun:

What I wish the new hires “knew”

Round-Up:

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]> Exaggerated Cybercrime | TechSNAP 54 https://original.jupiterbroadcasting.net/18867/exaggerated-cybercrime-techsnap-54/ Thu, 19 Apr 2012 16:47:21 +0000 https://original.jupiterbroadcasting.net/?p=18867 We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

All that and much more, on this week’s TechhSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7

Want to save money on your entire order? Use our code spring7 and save 15%!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Support the Show:

Show Notes:

OpenSSL Vulnerability

  • Two developers from the Google Security Team found a flaw in OpenSSL and contributed the fix
  • The flaw affects all versions of OpenSSL before 1.0.1a, 1.0.0i or 0.9.8v
  • Official Announcement
  • Full Disclosure
  • The vulnerability is in the way OpenSSL handles DER encoded data, which can cause a heap overflow and memory corruption
  • CVE Entry

US Unhappy With Australians Storing Data On Australian Shores

  • The US trade representatives specifically took issue with statements by the Australian Department of Defence, which has been making negative comments about various cloud providers based outside of Australia, implying that “hosting data overseas, including in the United States, by definition entails greater risk and unduly exposes consumers to their data being scrutinized by foreign governments.”
  • The issues first arose when the AU government started considering storing data in the cloud
  • The privacy commissioner raised many concerns about the security of the data in foriegn hands, and also the governments inability to legislate against foreign service providers
  • More coverage
    *

    Cybercrime massively over reported, statistics totally unrealistic

  • Some reports claim that losses due to cybercrime could be as much as $1 Trillion US Dollars
  • Most cybercrime estimates are based on surveys of consumers and companies, and are very unreliable
  • Normal statistical polling for opinion questions, such as seen with political polling works well, however the same method does not work for questions related to a value, because there are no negative values to cancel out the statistical outliers when then get extrapolated resulting in a large upward bias
  • In a 2006 survey of identity theft by the Federal Trade Commission, two respondents gave answers that, when extrapolated to the entire population, would have added $37 billion to the estimate, dwarfing that of all other respondents combined
  • Numbers are also exaggerated by the same pool of gullible and unprotected users being repeatedly targeted, which leads to diminishing returns, however the unreliable statistical models do not take this into consideration

Feedback:

Q: Simon asks about running multiple servers behind a single IP address

A:

  • NAT may be the best answer, especially if you need NAT anyway for the 3 servers to connect out to the internet in the first place
  • You can forward the traffic using something like ‘balance’ or ‘HAProxy’, however the disadvantage to this over NAT is that the internal machines will see the source IP as the LAN IP of the internet facing machine, whereas with NAT they will see the original source IP address
  • For web traffic HTTP (80) and HTTPS (443), you can use nginx, and apache mod_rpaf to pass the original source IP to the internal apache server(s)
  • FreeBSD’s IPFW firewall has the ‘forward’ command, however this does not rewrite the headers of the packet, so the server that receives the forwarded packet needs to know what to do with it

War Story:

Mike sends in his own IBM war story:

After hearing so many war stories from the Other Other Alan, I decided to add one of my own IBM war stories.
I’ve been a contract employee from IBM since 1997. Early in 2000 I and 4 other guys were assigned to a new Network Operations Outsourcing Center. The basic idea was that we four would perform network operations for customers, small/medium businesses external to IBM. Our first customer was a textile company with facilities scattered across the continental US from Georgia to California. IBM sales sold the company a package of software, hardware and services which included IBM Tivoli and Netview monitoring that we were to use to do our monitoring and maintenance of their network.

So, as was always the case back then IBM had specialists who would go out in the field and perform installs and configuration for the customer (in this case us) and then we would be responsible for maintaining it. The initial install took nearly a week with a couple of days of training. Now imagine all the oohs and ahs as all this was running on three HUGE IBM Netfinity 5500 Quad PIII Beasts running Windows NT server and the technicians were explaining all the bells and whistles including event correlation and intelligent discovery. Two days after they left, the database crashed. Well we couldn’t be down with no method of monitoring the customer’s systems. So we took an old copy of “What’s up Gold” and installed it on the only spare hardware we had, a Thinkpad 765. So, as IBM repeatedly sent out technicians to fix one thing or another with the Tivoli environment, or the Oracle database from Hell, we chugged on for an entire year monitoring 40 odd NT servers and an equal amount of network hardware…from a little old pentium 166 laptop, while untold thousands of dollars worth of software and hardware sat almost unused until it was disassembled at the end of the contract.


Round-UP:

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>